Fundamentals of Computer Networks ECE 478/578 Lecture #9: Collision Resolution and Collision Free Protocols Instructor: Loukas Lazos Dept of Electrical.

Slides:



Advertisements
Similar presentations
Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
Advertisements

Fundamentals of Computer Networks ECE 478/578 Lecture #13: Packet Switching (2) Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 CNPA B Nasser S. Abouzakhar Queuing Disciplines Week 8 – Lecture 2 16 th November, 2009.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Fundamentals of Computer Networks ECE 478/578
Lecture 9: Multiple Access Protocols
The Data Link Layer introduction point-to-point data link protocols
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Lecture 2 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
1 6/27/ :02 Chapter 15LAN Performance1 Rivier College CS575: Advanced LANs Chapter 15: LAN Performance.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Two Media Access Control Protocols (MAC) for Wireless Networks.
Lecture Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
ECE358: Computer Networks Spring 2012
CS352- Link Layer Dept. of Computer Science Rutgers University.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Binary Exponential Backoff Binary exponential backoff refers to a collision resolution mechanism used in random access MAC protocols. This algorithm is.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CSC4220/6220 Computer Networks
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Fundamentals of Computer Networks ECE 478/578
Broadcast-and-select networks. Each node is usually attached to two fibers: one to transmit, one to receive W WDM channels are available Tx and Rx operate.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
QoS Guaranteed Provisioning over GPRS Wireless Mobile Links Benjamin ESHUN MSc CCN INT France.
Fundamentals of Computer Networks ECE 478/578 Lecture #11: Ethernet Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Week3 The Medium Access Sublayer
Introduction to Queueing Theory
CT301 LECTURE 8.
Topics in Distributed Wireless Medium Access Control
Services of DLL Framing Link access Reliable delivery
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Overview Jaringan Komputer (3)
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
Data Communication Networks
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Fundamentals of Computer Networks ECE 478/578 Lecture #9: Collision Resolution and Collision Free Protocols Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona

Collision Resolution Protocols Assume collision between only two packets All new arrivals defer from transmission Node transmits at the next slot with prob ½ Let X denote the # of slots req to resolve collision 2 Throughput = 2/3

Tree Splitting Algorithm 3 Set S R LRL LL LRRL LR LRR LRRR SlotXmit SetWaiting SetFeedback 1S-e 2LRe 3LLLR, R1 4LRRe 5LRLLRR, R0 6LRRRe 7LRRLLRRR,R1 8LRRRR1 9R-0 L idle collision success collision idle collision success Resolution of collision of three stations New arrivals accumulate during contention period Throughput approx 0.43 p/s (need 43 slots for 10 packets)

Improvements 4 Set S R LRL LL LRRL LR LRR LRRR L idle collision success collision idle collision success Guaranteed to have a collision here Two collisions in a row, R must have a small number of packets Incorporate to new arrivals

First Come First Serve Splitting 5 k k+1 current time k+2 k+3 allocationwaiting allocation waiting allocation Split right away two collisions current time

Multi-Access Reservations Idea: Use reservation (contention) slots to make reservations for later transmissions Reservations much smaller size than data Any method can be used to contend for reservation slots (or not contend) 6

Contention lasts N slots (equal to # of stations) Station “i” transmits one bit in slot i if it has a frame to transmit After all the N slots are completed, every station knows who has frames to transmit, start data transmission in that order Example: Assume there are 8 stations Lower numbered stations have to wait for more time Efficiency d/(d + N), d = length of data frame Example: Satellite Reservation System 7

Inefficiency of Reservation System What if the number of stations N is large? Nodes have to wait for a long time to send data Reservation period grows very large 8

Binary Countdown Protocol Each station is assigned a binary address of bits Stations broadcast their address one bit at the time, if they have a frame to transmit Take the OR of all bits wanting to transmit (nodes know the outcome of OR based on electric property of medium) If node with higher address transmits, back off 9 Drop off after slot 0 Drop off after slot 2 Winner Efficiency:

(Un)Fairness of Binary Countdown Stations with highest addresses always win Good for implementing a priority scheme To make the protocol fair, addresses of hosts need to be dynamic 10

Implementing Fairness After node A transmits, all hosts with address less than A increase their address by one Node’s A address is set to zero All nodes before A get a higher priority Round robin type of protocol 11